nick0lass's Stars
sevagas/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
p3nt4/PowerShdll
Run PowerShell with rundll32. Bypass software restrictions.
mandatoryprogrammer/CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
AD-Security/AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
GhostPack/SharpDPAPI
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
FuzzySecurity/Sharp-Suite
Also known by Microsoft as Knifecoat :hot_pepper:
Tylous/SourcePoint
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
RedSiege/C2concealer
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
trustedsec/CS-Remote-OPs-BOF
gmelodie/awesome-wordlists
A curated list wordlists for bruteforcing and fuzzing
aquasecurity/cloud-security-remediation-guides
Security Remediation Guides
djhohnstein/SharpChromium
.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.
snyk/actions
A set of GitHub actions for checking your projects for vulnerabilities
vxCrypt0r/Voidgate
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page.
Maldev-Academy/ExecutePeFromPngViaLNK
Extract and execute a PE embedded within a PNG file using an LNK file.
vxCrypt0r/Voidmaw
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables that will be flagged by the antimalware programs(such as mimikatz).
Maldev-Academy/EmbedPayloadInPng
Embed a payload inside a PNG file
Pennyw0rth/NetExec-Lab
Lab used for workshop and CTF
rasta-mouse/process-inject-kit
Port of Cobalt Strike's Process Inject Kit
Malcrove/SeamlessPass
A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO
SpecterOps/cred1py
A Python POC for CRED1 over SOCKS5
RootUp/SmuggleShield
Protection against HTML smuggling attempts.
zh54321/EntraTokenAid
A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens
t3hbb/PanGP_Extractor
Tool to extract username and password of current user from PanGPA in plaintext
IncludeSecurity/c2-vulnerabilities
PoCs of RCEs against open source C2 servers
praetorian-inc/0days-in-the-wild
Repository for information about 0-days exploited in-the-wild.
a7t0fwa7/Custom-GetProcAddress
A custom implementation of GetProcAddress, often used in malware to evade detection by bypassing standard API resolution methods
t3hbb/APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
t3hbb/HTMLSmuggler
✉️ HTML Smuggling generator&obfuscator for your Red Team operations